Author of the publication

Authentication and Access Control based on Distributed Ledger Technology: A survey.

, , , and . BRAINS, page 79-86. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey., , , and . Comput. Sci. Rev., (November 2023)Authentication and Access Control based on Distributed Ledger Technology: A survey., , , and . BRAINS, page 79-86. IEEE, (2020)Random-Value Payment Tokens for On-Chain Privacy-Preserving Payments., , , , , and . CoopIS, volume 13591 of Lecture Notes in Computer Science, page 223-241. Springer, (2022)Cross-Collaboration Processes based on Blockchain and IoT: a survey., , , , and . HICSS, page 1-10. ScholarSpace, (2021)Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications?, , and . CSNet, page 21-27. IEEE, (2019)Trustworthy Cross-Organizational Collaborations with Hybrid On/Off-Chain Declarative Choreographies., , , , , and . ICSOC, volume 13121 of Lecture Notes in Computer Science, page 81-96. Springer, (2021)Welcome to the Jungle: A Reference Model for Blockchain, DLT and Smart-Contracts (Short Paper)., , , and . Tokenomics, volume 82 of OASIcs, page 13:1-13:5. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Payment card forensic analysis: From concepts to desktop and mobile analysis tools., , , , , and . Digit. Investig., 11 (3): 143-153 (2014)A decision tree for building IT applications., , and . Ann. des Télécommunications, 76 (3-4): 131-144 (2021)A Novel Access Control Method Via Smart Contracts for Internet-Based Service Provisioning., , , , and . IEEE Access, (2021)